C:\top\xuxuvodasipoji\j.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd338f4ee59666c6beae35cef31248e2ba1f64310e3e202ba864bb353f34d3d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd338f4ee59666c6beae35cef31248e2ba1f64310e3e202ba864bb353f34d3d8.exe
Resource
win10v2004-20241007-en
General
-
Target
fd338f4ee59666c6beae35cef31248e2ba1f64310e3e202ba864bb353f34d3d8
-
Size
292KB
-
MD5
403fcc60981d472bd43a72acf2dedb84
-
SHA1
fff7d47385bbf8b7619be81e08f878593a22afb9
-
SHA256
fd338f4ee59666c6beae35cef31248e2ba1f64310e3e202ba864bb353f34d3d8
-
SHA512
c6014e1f5bec5f8781d43d77da16b76cf2f7dd8281f82f6f57c224554d6e6b6ead4d06e58405788658463c22c727c6cd89fbfa3d10a6938e04f2d727f1fc94d9
-
SSDEEP
3072:IwFQUcPl3hYsjfVAUmUsxkgaBChUpZa9uD6Vdyhk:uUcPhhFRmhiga3wVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd338f4ee59666c6beae35cef31248e2ba1f64310e3e202ba864bb353f34d3d8
Files
-
fd338f4ee59666c6beae35cef31248e2ba1f64310e3e202ba864bb353f34d3d8.exe windows:5 windows x86 arch:x86
9da0d74cac4c960ec15db64cdb1b6055
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CommConfigDialogA
FindResourceW
FreeLibrary
GetCurrentProcess
GetEnvironmentStringsW
GetModuleHandleW
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
CreateEventA
SetConsoleMode
GetBinaryTypeA
GetModuleFileNameW
InterlockedExchange
GetConsoleAliasesLengthW
SetLastError
GetProcAddress
MoveFileW
GetDiskFreeSpaceW
LoadLibraryA
GetProcessWorkingSetSize
TransmitCommChar
OpenJobObjectW
EnumCalendarInfoExA
SetFileAttributesW
lstrcmpA
SetDefaultCommConfigA
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
ExitProcess
DecodePointer
WriteFile
GetStdHandle
EncodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
WriteConsoleW
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapSize
HeapReAlloc
CreateFileW
CloseHandle
GetStringTypeW
LCMapStringW
advapi32
CreateRestrictedToken
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 646KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.susu Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rocaf Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ